xStack® DES-3200 Series Layer 2 Ethernet Managed Switch CLI Reference Guide
256
DES-3200-
28:4#config authen_enable default method xtacacs tacacs+
local_enable
Command: config authen_enable default method xtacacs tacacs+ local_enable
Success.
DES-3200-28:4#
delete authen_enable method_list_name
Purpose
Used to delete a user-defined method list of authentication methods
for promoting normal user level privileges to Administrator level
privileges on the Switch.
Syntax
delete authen_enable method_list_name <string 15>
Description
This command is used to delete a user-defined method list of
authentication methods for promoting user level privileges to
Administrator level privileges.
Parameters
<string 15> − Enter an alphanumeric string of up to 15 characters to
define the given enable method list to delete.
Restrictions
Only Administrator-level users can issue this command.
Example usage:
To delete the user-defined method list “Permit”
DES-3200-28:4#delete authen_enable method_list_name Permit
Command: delete authen_enable method_list_name Permit
Success.
DES-3200-28:4#
show authen_enable
Purpose
Used to display the method list of authentication methods for promoting
normal user level privileges to Administrator level privileges on the
Switch.
Syntax
show authen_enable [default | method_list_name <string 15> | all]
Description
This command is used to delete a user-defined method list of
authentication methods for promoting user level privileges to
Administrator level privileges.
Parameters
default – Entering this parameter will display the default method list for
users attempting to gain access to Administrator level privileges on the
Switch.
method_list_name <string 15> − Enter an alphanumeric string of up to
15 characters to define the given method list the user wishes to view.
all – Entering this parameter will display all the authentication login
methods currently configured on the Switch.
The window will display the following parameters:
Method List Name – The name of a previously configured method list
name.
Priority – Defines which order the method list protocols will be queried
for authentication when a user attempts to log on to the Switch. Priority
ranges from 1(highest) to 4 (lowest).
Method Name – Defines which security protocols are implemented, per
method list name.